From patchwork Thu Nov 23 10:40:43 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Abdellatif El Khlifi X-Patchwork-Id: 35121 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 73A56C61D85 for ; Thu, 23 Nov 2023 10:41:06 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web11.88446.1700736058536594163 for ; Thu, 23 Nov 2023 02:40:58 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: abdellatif.elkhlifi@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 8A9D31042; Thu, 23 Nov 2023 02:41:44 -0800 (PST) Received: from e130802.arm.com (unknown [10.57.83.218]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 002163F73F; Thu, 23 Nov 2023 02:40:56 -0800 (PST) From: abdellatif.elkhlifi@arm.com To: meta-arm@lists.yoctoproject.org, Jon.Mason@arm.com Cc: nd@arm.com, Abdellatif El Khlifi Subject: [PATCH 1/4] arm-bsp/documentation: corstone1000: update the release note Date: Thu, 23 Nov 2023 10:40:43 +0000 Message-Id: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Nov 2023 10:41:06 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5247 From: Abdellatif El Khlifi align the release note with the upcoming CORSTONE1000-2023.11 release Signed-off-by: Abdellatif El Khlifi --- .../corstone1000/release-notes.rst | 21 +++++++++++++++++++ 1 file changed, 21 insertions(+) diff --git a/meta-arm-bsp/documentation/corstone1000/release-notes.rst b/meta-arm-bsp/documentation/corstone1000/release-notes.rst index 62e3f8ff..83e250d5 100644 --- a/meta-arm-bsp/documentation/corstone1000/release-notes.rst +++ b/meta-arm-bsp/documentation/corstone1000/release-notes.rst @@ -19,6 +19,27 @@ intended for safety-critical applications. Should Your Software or Your Hardware prove defective, you assume the entire cost of all necessary servicing, repair or correction. +*********************** +Release notes - 2023.11 +*********************** + +Known Issues or Limitations +--------------------------- + + - Use Ethernet over VirtIO due to lan91c111 Ethernet driver support dropped from U-Boot. + - Temporally removing the External system support in Linux due to it using multiple custom devicetree bindings that caused problems with SystemReady IR 2.0 certification. For External system support please refer to the version 2023.06. We are aiming to restore it in a more standardised manner in our next release. + - Due to the performance uplimit of MPS3 FPGA and FVP, some Linux distros like Fedora Rawhide can not boot on Corstone-1000 (i.e. user may experience timeouts or boot hang). + - PSA Crypto tests (psa-crypto-api-test command) approximately take 30 minutes to complete for FVP and MPS3. + - Corstone-1000 SoC on FVP doesn't have a secure debug peripheral. It does on the MPS3. + - See previous release notes for the known limitations regarding ACS tests. + +Platform Support +----------------- + - This software release is tested on Corstone-1000 FPGA version AN550_v2 + https://developer.arm.com/downloads/-/download-fpga-images + - This software release is tested on Corstone-1000 Fast Model platform (FVP) version 11_23.25 + https://developer.arm.com/tools-and-software/open-source-software/arm-platforms-software/arm-ecosystem-fvps + *********************** Release notes - 2023.06 *********************** From patchwork Thu Nov 23 10:40:44 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Abdellatif El Khlifi X-Patchwork-Id: 35123 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 809DDC624B4 for ; Thu, 23 Nov 2023 10:41:06 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.88125.1700736060718082912 for ; Thu, 23 Nov 2023 02:41:01 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: abdellatif.elkhlifi@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 180001042; Thu, 23 Nov 2023 02:41:46 -0800 (PST) Received: from e130802.arm.com (unknown [10.57.83.218]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 82CE83F73F; Thu, 23 Nov 2023 02:40:58 -0800 (PST) From: abdellatif.elkhlifi@arm.com To: meta-arm@lists.yoctoproject.org, Jon.Mason@arm.com Cc: nd@arm.com, Abdellatif El Khlifi Subject: [PATCH 2/4] arm-bsp/documentation: corstone1000: update the change log Date: Thu, 23 Nov 2023 10:40:44 +0000 Message-Id: <20231123104046.72820-2-abdellatif.elkhlifi@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> References: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Nov 2023 10:41:06 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5248 From: Abdellatif El Khlifi align the change log with the upcoming CORSTONE1000-2023.11 release Signed-off-by: Abdellatif El Khlifi --- .../documentation/corstone1000/change-log.rst | 71 +++++++++++++++++++ 1 file changed, 71 insertions(+) diff --git a/meta-arm-bsp/documentation/corstone1000/change-log.rst b/meta-arm-bsp/documentation/corstone1000/change-log.rst index 32d65292..173823b6 100644 --- a/meta-arm-bsp/documentation/corstone1000/change-log.rst +++ b/meta-arm-bsp/documentation/corstone1000/change-log.rst @@ -10,6 +10,77 @@ Change Log This document contains a summary of the new features, changes and fixes in each release of Corstone-1000 software stack. +*************** +Version 2023.11 +*************** + +Changes +======= + +- Making Corstone-1000 SystemReady IR 2.0 certifiable +- Allow booting Debian & OpenSUSE on FVP +- Add support for two MMC cards for the FVP +- Add signed capsule update support +- Enable on-disk capsule update +- Add the feature of purging specific DT nodes in U-Boot before Linux +- Add Ethernet over VirtIO support in U-Boot +- Add support for unaligned MMC card images +- Reducing the out-of-tree patches by upstreaming them to the corresponding open-source projects +- SW components upgrades +- Bug fixes + +Corstone-1000 components versions +================================= + ++-------------------------------------------+-----------------------------------------------------+ +| arm-ffa-tee | 1.1.2-r0 | ++-------------------------------------------+-----------------------------------------------------+ +| linux-yocto | 6.5.7 | ++-------------------------------------------+-----------------------------------------------------+ +| u-boot | 2023.07 | ++-------------------------------------------+-----------------------------------------------------+ +| external-system | 0.1.0+gitAUTOINC+8c9dca74b1-r0 | ++-------------------------------------------+-----------------------------------------------------+ +| optee-client | 3.22.0 | ++-------------------------------------------+-----------------------------------------------------+ +| optee-os | 3.22.0 | ++-------------------------------------------+-----------------------------------------------------+ +| trusted-firmware-a | 2.9.0 | ++-------------------------------------------+-----------------------------------------------------+ +| trusted-firmware-m | 1.8.1 | ++-------------------------------------------+-----------------------------------------------------+ +| libts | 08b3d39471 | ++-------------------------------------------+-----------------------------------------------------+ +| ts-newlib | 4.1.0 | ++-------------------------------------------+-----------------------------------------------------+ +| ts-psa-{crypto, iat, its. ps}-api-test | 38cb53a4d9 | ++-------------------------------------------+-----------------------------------------------------+ +| ts-sp-{se-proxy, smm-gateway} | 08b3d39471 | ++-------------------------------------------+-----------------------------------------------------+ + +Yocto distribution components versions +====================================== + ++-------------------------------------------+------------------------------+ +| meta-arm | nanbield | ++-------------------------------------------+------------------------------+ +| poky | nanbield | ++-------------------------------------------+------------------------------+ +| meta-openembedded | nanbield | ++-------------------------------------------+------------------------------+ +| meta-secure-core | nanbield | ++-------------------------------------------+------------------------------+ +| busybox | 1.36.1 | ++-------------------------------------------+------------------------------+ +| musl | 1.2.4 | ++-------------------------------------------+------------------------------+ +| gcc-arm-none-eabi | 11.2-2022.02 | ++-------------------------------------------+------------------------------+ +| gcc-cross-aarch64 | 13.2.0 | ++-------------------------------------------+------------------------------+ +| openssl | 3.1.3 | ++-------------------------------------------+------------------------------+ + *************** Version 2023.06 *************** From patchwork Thu Nov 23 10:40:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Abdellatif El Khlifi X-Patchwork-Id: 35124 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8D0B4C636CB for ; Thu, 23 Nov 2023 10:41:06 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.88126.1700736061792470862 for ; Thu, 23 Nov 2023 02:41:01 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: abdellatif.elkhlifi@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CEA051042; Thu, 23 Nov 2023 02:41:47 -0800 (PST) Received: from e130802.arm.com (unknown [10.57.83.218]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 11A243F73F; Thu, 23 Nov 2023 02:40:59 -0800 (PST) From: abdellatif.elkhlifi@arm.com To: meta-arm@lists.yoctoproject.org, Jon.Mason@arm.com Cc: nd@arm.com, Abdellatif El Khlifi Subject: [PATCH 3/4] arm-bsp/documentation: corstone1000: update the user guide Date: Thu, 23 Nov 2023 10:40:45 +0000 Message-Id: <20231123104046.72820-3-abdellatif.elkhlifi@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> References: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Nov 2023 10:41:06 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5249 From: Abdellatif El Khlifi align the user guide with the upcoming CORSTONE1000-2023.11 release Signed-off-by: Abdellatif El Khlifi --- .../documentation/corstone1000/user-guide.rst | 165 ++++-------------- 1 file changed, 32 insertions(+), 133 deletions(-) diff --git a/meta-arm-bsp/documentation/corstone1000/user-guide.rst b/meta-arm-bsp/documentation/corstone1000/user-guide.rst index 838a04f1..2e5966b8 100644 --- a/meta-arm-bsp/documentation/corstone1000/user-guide.rst +++ b/meta-arm-bsp/documentation/corstone1000/user-guide.rst @@ -68,33 +68,33 @@ Trusted Firmware-A ================== Based on `Trusted Firmware-A `__ -+----------+-----------------------------------------------------------------------------------------------------+ -| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.8.%.bbappend | -+----------+-----------------------------------------------------------------------------------------------------+ -| Recipe | <_workspace>/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.8.0.bb | -+----------+-----------------------------------------------------------------------------------------------------+ ++----------+-------------------------------------------------------------------------------------------------+ +| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-a/trusted-firmware-a_%.bbappend | ++----------+-------------------------------------------------------------------------------------------------+ +| Recipe | <_workspace>/meta-arm/meta-arm/recipes-bsp/trusted-firmware-a/trusted-firmware-a_2.9.0.bb | ++----------+-------------------------------------------------------------------------------------------------+ OP-TEE ====== Based on `OP-TEE `__ -+----------+------------------------------------------------------------------------------------+ -| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_3.20.0.bbappend | -+----------+------------------------------------------------------------------------------------+ -| Recipe | <_workspace>/meta-arm/meta-arm/recipes-security/optee/optee-os_3.20.0.bb | -+----------+------------------------------------------------------------------------------------+ ++----------+----------------------------------------------------------------------------------------+ +| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_3.22.0.bbappend | ++----------+----------------------------------------------------------------------------------------+ +| Recipe | <_workspace>/meta-arm/meta-arm-bsp/recipes-security/optee/optee-os_3.22.0.bb | ++----------+----------------------------------------------------------------------------------------+ U-Boot ====== Based on `U-Boot repo`_ -+----------+-------------------------------------------------------------------------+ -| bbappend | <_workspace>/meta-arm/meta-arm/recipes-bsp/u-boot/u-boot_%.bbappend | -+----------+-------------------------------------------------------------------------+ -| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot_%.bbappend | -+----------+-------------------------------------------------------------------------+ -| Recipe | <_workspace>/poky/meta/recipes-bsp/u-boot/u-boot_2023.01.bb | -+----------+-------------------------------------------------------------------------+ ++----------+----------------------------------------------------------------------------+ +| bbappend | <_workspace>/meta-arm/meta-arm/recipes-bsp/u-boot/u-boot_%.bbappend | ++----------+----------------------------------------------------------------------------+ +| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot_%.bbappend | ++----------+----------------------------------------------------------------------------+ +| Recipe | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/u-boot/u-boot_2023.07.02.bb | ++----------+----------------------------------------------------------------------------+ Linux ===== @@ -107,30 +107,20 @@ recipe responsible for building a tiny version of Linux is listed below. +-----------+----------------------------------------------------------------------------------------------+ | bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-kernel/linux/linux-yocto_%.bbappend | +-----------+----------------------------------------------------------------------------------------------+ -| Recipe | <_workspace>/poky/meta/recipes-kernel/linux/linux-yocto_6.1.bb | +| Recipe | <_workspace>/poky/meta/recipes-kernel/linux/linux-yocto_6.5.bb | +-----------+----------------------------------------------------------------------------------------------+ | defconfig | <_workspace>/meta-arm/meta-arm-bsp/recipes-kernel/linux/files/corstone1000/defconfig | +-----------+----------------------------------------------------------------------------------------------+ -External System Tests -===================== -Based on `Corstone-1000/applications `__ - -+------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ -| Recipe | <_workspace>/meta-arm/meta-arm-bsp/recipes-test/corstone1000-external-sys-tests/corstone1000-external-sys-tests_1.0.bb | -+------------+-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------+ - -The recipe provides the systems-comms-tests command run in Linux and used for testing the External System. - ************************************************** Software for Boot Processor (a.k.a Secure Enclave) ************************************************** Based on `Trusted Firmware-M `__ +----------+-----------------------------------------------------------------------------------------------------+ -| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m_1.7.%.bbappend | +| bbappend | <_workspace>/meta-arm/meta-arm-bsp/recipes-bsp/trusted-firmware-m/trusted-firmware-m_%.bbappend | +----------+-----------------------------------------------------------------------------------------------------+ -| Recipe | <_workspace>/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/trusted-firmware-m_1.7.0.bb | +| Recipe | <_workspace>/meta-arm/meta-arm/recipes-bsp/trusted-firmware-m/trusted-firmware-m_1.8.1.bb | +----------+-----------------------------------------------------------------------------------------------------+ ******************************** @@ -168,7 +158,7 @@ In the top directory of the workspace ``<_workspace>``, run: :: - git clone https://git.yoctoproject.org/git/meta-arm -b CORSTONE1000-2023.06 + git clone https://git.yoctoproject.org/git/meta-arm -b CORSTONE1000-2023.11 To build a Corstone-1000 image for MPS3 FPGA, run: @@ -343,7 +333,7 @@ A Yocto recipe is provided and allows to download the latest supported FVP versi The recipe is located at <_workspace>/meta-arm/meta-arm/recipes-devtools/fvp/fvp-corstone1000.bb -The latest supported Fixed Virtual Platform (FVP) version is 11.19_21 and is automatically downloaded and installed when using the runfvp command as detailed below. The FVP version can be checked by running the following command: +The latest supported Fixed Virtual Platform (FVP) version is 11_23.25 and is automatically downloaded and installed when using the runfvp command as detailed below. The FVP version can be checked by running the following command: :: @@ -374,8 +364,6 @@ The host will boot trusted-firmware-a, OP-TEE, U-Boot and then Linux, and presen Login using the username root. -The External System can be released out of reset on demand using the systems-comms-tests command. - SystemReady-IR tests -------------------- @@ -408,8 +396,8 @@ boot. Run following commands to build such image. :: cd <_workspace> - git clone https://git.yoctoproject.org/git/meta-arm -b CORSTONE1000-2023.06 - git clone https://git.gitlab.arm.com/arm-reference-solutions/systemready-patch.git -b CORSTONE1000-2023.06 + git clone https://git.yoctoproject.org/git/meta-arm -b CORSTONE1000-2023.11 + git clone https://git.gitlab.arm.com/arm-reference-solutions/systemready-patch.git -b CORSTONE1000-2023.11 cp -f systemready-patch/embedded-a/corstone1000/erase_flash/0001-embedded-a-corstone1000-clean-secure-flash.patch meta-arm cd meta-arm git apply 0001-embedded-a-corstone1000-clean-secure-flash.patch @@ -595,7 +583,7 @@ Download u-boot under <_workspace> and install tools: Download systemready-patch repo under <_workspace>: :: - git clone https://git.gitlab.arm.com/arm-reference-solutions/systemready-patch.git -b CORSTONE1000-2023.06 + git clone https://git.gitlab.arm.com/arm-reference-solutions/systemready-patch.git -b CORSTONE1000-2023.11 ******************* Generating Capsules @@ -935,7 +923,7 @@ provided with the Debian installer image (see below). This bug causes a fatal error when attempting to boot media installer for Debian, and it resets the MPS3 before installation starts. A patch to be applied to the Corstone-1000 stack (only applicable when installing Debian) is provided to -`Skip the Shim `__. +`Skip the Shim `__. This patch makes U-Boot automatically bypass the Shim and run grub and allows the user to proceed with a normal installation. If at the moment of reading this document the problem is solved in the Shim, the user is encouraged to try the @@ -947,7 +935,7 @@ documentation. :: cd <_workspace> - git clone https://git.gitlab.arm.com/arm-reference-solutions/systemready-patch.git -b CORSTONE1000-2023.06 + git clone https://git.gitlab.arm.com/arm-reference-solutions/systemready-patch.git -b CORSTONE1000-2023.11 cp -f systemready-patch/embedded-a/corstone1000/shim/0001-arm-bsp-u-boot-corstone1000-Skip-the-shim-by-booting.patch meta-arm cd meta-arm git am 0001-arm-bsp-u-boot-corstone1000-Skip-the-shim-by-booting.patch @@ -1129,7 +1117,7 @@ First, load FF-A TEE kernel module: :: - insmod /lib/modules/6.1.32-yocto-standard/extra/arm-ffa-tee.ko + insmod /lib/modules/*-yocto-standard/extra/arm-ffa-tee.ko Then, check whether the FF-A TEE driver is loaded correctly by using the following command: @@ -1154,105 +1142,16 @@ Now, run the PSA API tests in the following order: **NOTE:** The psa-crypto-api-test takes between 30 minutes to 1 hour to run. -External System tests ---------------------- - -************************************************************** -Running the External System test command (systems-comms-tests) -************************************************************** - -Test 1: Releasing the External System out of reset -================================================== - -Run this command in the Linux command-line: - -:: - - systems-comms-tests 1 - -The output on the External System terminal should be: - -:: - - ___ ___ - | / __| - |=== \___ - |___ |___/ - External System Cortex-M3 Processor - Running RTX RTOS - v0.1.0_2022-10-19_16-41-32-8c9dca7 - MHUv2 module 'MHU0_H' started - MHUv2 module 'MHU1_H' started - MHUv2 module 'MHU0_SE' started - MHUv2 module 'MHU1_SE' started - -Test 2: Communication -===================== - -Test 2 releases the External System out of reset if not already done. Then, it performs communication between host and External System. - -After running Test 1, run this command in the Linux command-line: - -:: - - systems-comms-tests 2 - -Additional output on the External System terminal will be printed: - -:: - - MHUv2: Message from 'MHU0_H': 0xabcdef1 - Received 'abcdef1' From Host MHU0 - CMD: Increment and return to sender... - MHUv2: Message from 'MHU1_H': 0xabcdef1 - Received 'abcdef1' From Host MHU1 - CMD: Increment and return to sender... - -When running Test 2 the first, Test 1 will be run in the background. - -The output on the External System terminal should be: - -:: - - ___ ___ - | / __| - |=== \___ - |___ |___/ - External System Cortex-M3 Processor - Running RTX RTOS - v0.1.0_2022-10-19_16-41-32-8c9dca7 - MHUv2 module 'MHU0_H' started - MHUv2 module 'MHU1_H' started - MHUv2 module 'MHU0_SE' started - MHUv2 module 'MHU1_SE' started - MHUv2: Message from 'MHU0_H': 0xabcdef1 - Received 'abcdef1' From Host MHU0 - CMD: Increment and return to sender... - MHUv2: Message from 'MHU1_H': 0xabcdef1 - Received 'abcdef1' From Host MHU1 - CMD: Increment and return to sender... - -The output on the Host terminal should be: - -:: - - Received abcdf00 from es0mhu0 - Received abcdf00 from es0mhu1 - - Tests results ------------- -As a reference for the end user, reports for various tests for `Corstone-1000 software (CORSTONE1000-2023.06) `__ +As a reference for the end user, reports for various tests for `Corstone-1000 software (CORSTONE1000-2023.11) `__ can be found `here `__. -Running the software on FVP on Windows --------------------------------------- +Running the software on FVP on Windows or AArch64 Linux +------------------------------------------------------------ -If the user needs to run the Corstone-1000 software on FVP on Windows. The user -should follow the build instructions in this document to build on Linux host -PC, and copy the output binaries to the Windows PC where the FVP is located, -and launch the FVP binary. +The user should follow the build instructions in this document to build on a Linux host machine. Then, copy the output binaries to the Windows or Aarch64 Linux machine where the FVP is located. Then, launch the FVP binary. Security Issue Reporting ------------------------ From patchwork Thu Nov 23 10:40:46 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Abdellatif El Khlifi X-Patchwork-Id: 35122 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from aws-us-west-2-korg-lkml-1.web.codeaurora.org (localhost.localdomain [127.0.0.1]) by smtp.lore.kernel.org (Postfix) with ESMTP id 74BA9C5AD4C for ; Thu, 23 Nov 2023 10:41:06 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by mx.groups.io with SMTP id smtpd.web10.88128.1700736063149149098 for ; Thu, 23 Nov 2023 02:41:03 -0800 Authentication-Results: mx.groups.io; dkim=none (message not signed); spf=pass (domain: arm.com, ip: 217.140.110.172, mailfrom: abdellatif.elkhlifi@arm.com) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3B3151042; Thu, 23 Nov 2023 02:41:49 -0800 (PST) Received: from e130802.arm.com (unknown [10.57.83.218]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id B412B3F73F; Thu, 23 Nov 2023 02:41:01 -0800 (PST) From: abdellatif.elkhlifi@arm.com To: meta-arm@lists.yoctoproject.org, Jon.Mason@arm.com Cc: nd@arm.com, Emekcan Aras , Abdellatif El Khlifi Subject: [PATCH 4/4] arm-bsp/documentation: corstone1000: update the architecture document Date: Thu, 23 Nov 2023 10:40:46 +0000 Message-Id: <20231123104046.72820-4-abdellatif.elkhlifi@arm.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> References: <20231123104046.72820-1-abdellatif.elkhlifi@arm.com> MIME-Version: 1.0 List-Id: X-Webhook-Received: from li982-79.members.linode.com [45.33.32.79] by aws-us-west-2-korg-lkml-1.web.codeaurora.org with HTTPS for ; Thu, 23 Nov 2023 10:41:06 -0000 X-Groupsio-URL: https://lists.yoctoproject.org/g/meta-arm/message/5250 From: Emekcan Aras align the architecture document with the upcoming CORSTONE1000-2023.11 release Signed-off-by: Emekcan Aras Signed-off-by: Abdellatif El Khlifi --- .../corstone1000/software-architecture.rst | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) diff --git a/meta-arm-bsp/documentation/corstone1000/software-architecture.rst b/meta-arm-bsp/documentation/corstone1000/software-architecture.rst index bf3535b2..ce8bd7e0 100644 --- a/meta-arm-bsp/documentation/corstone1000/software-architecture.rst +++ b/meta-arm-bsp/documentation/corstone1000/software-architecture.rst @@ -72,8 +72,10 @@ non-secure and the secure world is performed via FF-A messages. An external system is intended to implement use-case specific functionality. The system is based on Cortex-M3 and run RTX RTOS. -Communictaion between external system and Host(cortex-A35) is performed -using MHU as transport mechanism and rpmsg messaging system. +Communication between the external system and Host (Cortex-A35) is performed +using MHU as transport mechanism and rpmsg messaging system (the external system +support in Linux is disabled in this release. More info about this change can be found in the +release-notes). Overall, the Corstone-1000 architecture is designed to cover a range of Power, Performance, and Area (PPA) applications, and enable extension @@ -157,9 +159,9 @@ Secure Firmware Update ********************** Apart from always booting the authorized images, it is also essential that -the device only accepts the authorized images in the firmware update +the device only accepts the authorized (signed) images in the firmware update process. Corstone-1000 supports OTA (Over the Air) firmware updates and -follows Platform Security Firmware Update sepcification (`FWU`_). +follows Platform Security Firmware Update specification (`FWU`_). As standardized into `FWU`_, the external flash is divided into two banks of which one bank has currently running images and the other bank is @@ -172,7 +174,10 @@ Image (the initramfs bundle). The new images are accepted in the form of a UEFI :width: 690 :alt: ExternalFlash - +When Firmware update is triggered, u-boot verifies the capsule by checking the +capsule signature, version number and size. Then it signals the Secure Enclave +that can start writing UEFI capsule into the flash. Once this operation finishes +,Secure Enclave resets the entire system. The Metadata Block in the flash has the below firmware update state machine. TF-M runs an OTA service that is responsible for accepting and updating the images in the flash. The communication between the UEFI Capsule update